09 June 2016

git branch

ref:  https://git-scm.com/book/en/v2/Git-Branching-Branches-in-a-Nutshell

06 May 2016

Python virtual environment

mkvirtualenv [-a project_path] [-i package] [-r requirements_file] [virtualenv options] ENVNAME
lsvirtualenv [-b] [-l] [-h]

showvirtualenv [env]

rmvirtualenv ENVNAME

workon [(-c|--cd)|(-n|--no-cd)] [environment_name|"."]



ref: http://virtualenvwrapper.readthedocs.io/en/latest/command_ref.html

04 April 2016

Domain Shadowing

In an attack that includes domain shadowing, an attacker will log into the domain register's website to set up a new subdomain registered to a new server IP address. By registering many subdomain names and IP addresses, attackers are able to avoid blacklists, but it does not allow attackers to bypass reputation-based filters.


angler Exploit Kit

reading for non technical


23 March 2016

Milik siapa fail itu

mencari fail tertentu milik pakej yang mana.

M4700:~$ dpkg --search /usr/include/openssl/ssl.h
libssl-dev:amd64: /usr/include/openssl/ssl.h

19 February 2016

LAG on PowerConnect


LAG(Ling Agregation Group) adalah features utk kombine 2 atau lebih kabel/port utk bekerja sebagai satu group. Boleh pilih mode:
  1) failover(master mati, secondary ambil alih),
  2) LACP(Link Agregation Control Protocol)

Kalau nak guna LACP, both end kena suport dan enable dulu.

Untuk PowerConnect, boleh pilih utk enable atau tak pada menu:
   Switching --> Link Agregation -->  LAG Membership
Enable LACP on channel 1 and 2

Tapi ada kemungkinan pada remote port tak support LACP, maka setiap kali enable LACP, kena semak status LAG samaada up atau down di:
   Switching --> Porst --> LAG Configuration (ShowAll)
LAG Status pada Channel 2 Down


11 February 2016


How SELinux Works

Consider these pieces of the SELinux puzzle:
  • Subjects
  • Objects
  • Policy
  • Mode
When a subject (such as an application) attempts to access an object (such as a file), the SELinux Security Server (inside the kernel) runs a check against the Policy Database. Depending on the current mode, if the SELinux Security Server grants permission, the subject is given access to the object. If the SELinux Security Server denies permission, a denied message is logged in /var/log/messages.

The Modes

SELinux has three modes (which can be set by the user). These modes will dictate how SELinux acts uponsubject request. The modes are: 
  • Enforcing — SELinux policy is enforced and subjects will be denied or granted access to objects based on the SELinux policy rules
  • Permissive — SELinux policy is not enforced and does not deny access, although denials are logged
  • Disabled — SELinux is completely disabled